default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 134 matches
- 2014
- 2013 International Conference on IT Convergence and Security, ICITCS 2013, Macau, China, December 16-18, 2013. IEEE Computer Society 2014, ISBN 978-1-4799-2845-3 [contents]
- 2013
- Feng Cheng, Amir Azodi, David Jaeger, Christoph Meinel:
Security Event Correlation Supported by Multi-Core Architecture. ICITCS 2013: 1-5 - Zameer Ahmed Adhoni, Husam Ahmed Al Hamad, Abdul Ahad Siddiqi, Zaheer Ahmed Adhoni:
CBQ-API: A Cloud-Based Programming Interface for Qur'anic Applications. ICITCS 2013: 1-5 - Kazuaki Aihara, Terumasa Aoki:
Motion Dense Sampling for Video Classification. ICITCS 2013: 1-4 - Nik Ahmad Akram, Niusha Shafiabady, Dino Isa:
Using Neural Networks as Pipeline Defect Classifiers. ICITCS 2013: 1-4 - Ahmad A. Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah:
A Framework for Energy Monitoring and Management System for Educational Institutions. ICITCS 2013: 1-4 - Sumaia Mohammed Al-Ghuribi, Saleh Alshomrani:
A Simple Study of Webpage Text Classification Algorithms for Arabic and English Languages. ICITCS 2013: 1-5 - Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Dynamic Innate Immune System Model for Malware Detection. ICITCS 2013: 1-4 - Hanan Aljuaid, Dzulkifli Mohamad:
Child's Body Part Tracking Simulates Babysitter Vision Robot. ICITCS 2013: 1-4 - Abdullah A. I. Alnajem, Ning Zhang:
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. ICITCS 2013: 1-4 - Khadidja Ameur, Nadjia Benblidia, Saliha Oukid-Khouas:
Enhanced Visual Clustering by Reordering of Dimensions in Parallel Coordinates. ICITCS 2013: 1-4 - Abdulrahman Azab, Hein Meling:
Building Composite Grid Tasks Using STROLL File-System. ICITCS 2013: 1-4 - Siham Bacha, Nadjia Benblidia:
Combining Context and Content for Automatic Image Annotation on Mobile Phones. ICITCS 2013: 1-4 - Mohsen Bafandehkar, Sharifah Md Yasin, Ramlan Mahmod, Zurina Mohd Hanapi:
Comparison of ECC and RSA Algorithm in Resource Constrained Devices. ICITCS 2013: 1-3 - Anusha Bandari, D. Aarti, S. Alekhya, Ashok Shigli, Ibrahim Patel:
Wireless Radio Frequency Transmission for Bladder Pressure. ICITCS 2013: 1-4 - Sang-Won Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im:
Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers. ICITCS 2013: 1-2 - Sahar Bayoumi, Elham AlSobky, Moneerah Al-Mohsin, Manahel Al-Twaim, Monira Alkaldi, Munera Alkahtani:
A Real-Time Fire Detection and Notification System Based on Computer Vision. ICITCS 2013: 1-4 - Rouzbeh Behnia, Swee-Huay Heng:
Notes on Two Flawed Attacks on Undeniable Signature Schemes. ICITCS 2013: 1-4 - Sanjaa Bold, Min A. Jeong, Seong Min Jeon, Seong-Ro Lee:
FPGA Based Real Time Embedded Color Tracking Mobile Robot. ICITCS 2013: 1-4 - Regin Cabacas, In-ho Ra:
Evaluating Mobility Models in Delay Tolerant Network. ICITCS 2013: 1-4 - Anu Mary Chacko, Suresh Kumar, Vinod Pathari:
Generalized Architecture to Capture End to End Provenance in a System. ICITCS 2013: 1-4 - Abel Avitesh Chandra, Yeonwoo Lee, Beom Mu Kim, Se Yeong Maeng, Sang Hyeok Park, Seong Ro Lee:
Review on Sensor Cloud and Its Integration with Arduino Based Sensor Network. ICITCS 2013: 1-4 - Ee Hung Chang, Kang-Leng Chiew, San-Nah Sze, Wei King Tiong:
Phishing Detection via Identification of Website Identity. ICITCS 2013: 1-4 - Sang-woo Chang, Sang-Sun Lee:
A Study on Distance-Based Multi-Hop Broadcast Scheme for Inter-Vehicle Communication. ICITCS 2013: 1-4 - Youzheng Chen, Baozhong Cheng, Xiaoyan Zhang, Yi Sun, Jin Xie, Kun Li:
Development of Doubango-Based IMS UE for Teaching Experiments. ICITCS 2013: 1-4 - Gary Cheng, Juliana Chau:
An Approach to Identify Levels of Reflection Using Latent Semantic Analysis. ICITCS 2013: 1-3 - Insu Cho, Heejun Park:
Spatial Information Service Model and Considerations in u-City. ICITCS 2013: 1-3 - Bee Bee Chua, Danilo Valeros Bernardo:
Open Source Developer Download Tiers: A Survival Framework. ICITCS 2013: 1-5 - Min-Hooi Chuah, Kee-Luen Wong:
An Enterprise Business Intelligence Maturity Model: Case Study Approach. ICITCS 2013: 1-4 - Do-Young Chung, Sok-Joon Lee, Sin-Hyo Kim:
An Implementation and Experiment of Wireless Attack Emulator on Windows Environment. ICITCS 2013: 1-4
skipping 104 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-26 22:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint